Milnsbridge Managed IT Services is a Sydney-based managed service provider founded in 2002, with offices in Sydney CBD and Penrith. We manage cyber security for businesses with 10 to 200 employees across Greater Sydney. Credential compromise — weak passwords, reused passwords, and stolen credentials — remains the most common way attackers gain access to business systems. This guide covers password hygiene, password management, and multi-factor authentication: the three controls that address the credential problem at the source.
Why Credentials Are Still the Biggest Target
The majority of successful business cyber incidents start with a compromised credential. An attacker does not need to break through your firewall if they can log in with a valid username and password. Phishing emails steal credentials directly. Data breaches at third-party services expose passwords that users have reused on business systems. Brute-force attacks try known password patterns against exposed login pages. Once inside with a valid credential, attackers can move laterally, escalate privileges, and cause damage that looks like legitimate user activity — because it is using legitimate credentials.
The three controls that address this: strong unique passwords (eliminating reuse and guessable patterns), a password manager (making strong unique passwords practical to use), and multi-factor authentication (making a stolen password insufficient on its own to gain access).
Password Hygiene Fundamentals
Use a unique password for every account. This is the single most impactful password hygiene rule. If you reuse a password across multiple accounts and one of those accounts is compromised in a data breach, every other account using that password is now exposed. Credential stuffing attacks — automated attempts to use breached credentials against other services — are extremely common and succeed specifically because of password reuse.
Use long, random passwords. A long random password (20+ characters, generated by a password manager) is vastly stronger than any human-constructed password, regardless of how clever the pattern. Replacing letters with numbers and adding exclamation marks to a dictionary word is not strong password hygiene — it is predictable to modern cracking tools. Randomly generated passwords are not.
Never use personal information. Names, dates, pet names, footy teams, and company names are all guessable through public information and social engineering. Attackers know to try them.
Change passwords after any potential exposure. If a service you use is breached, or if you suspect a credential may have been compromised, change it immediately. Do not wait for confirmation. Waiting for certainty after a breach is how attackers get weeks of undetected access.
Password Managers: Making Good Hygiene Practical
The reason password reuse is so common is practical: it is genuinely difficult to remember dozens of unique, complex passwords. A password manager solves this problem by storing all your credentials in an encrypted vault, generating strong random passwords for every account, and auto-filling them when needed. You remember one strong master password; the manager handles everything else.
For businesses, password managers do more than help individual users. They enable:
- Secure credential sharing — shared accounts (like service logins) can be shared between staff without anyone knowing the actual password, and access revoked instantly when staff leave
- Security auditing — password managers identify reused, weak, or breached passwords across all stored credentials
- Offboarding control — when a staff member leaves, their access to shared credentials is revoked without requiring password resets across every system
- Compliance documentation — audit logs of credential access support security compliance requirements
Milnsbridge includes Keeper password management in the Growth plan at $99 per seat per month. Keeper is deployed and managed across all staff accounts, with admin visibility into password health across the organisation and secure shared vault access for team credentials.
Multi-Factor Authentication: The Essential Second Layer
Multi-factor authentication (MFA) requires users to verify their identity using two distinct methods — typically something they know (their password) and something they have (a code from an authenticator app, a hardware token, or a push notification to their phone). Even if an attacker steals a valid password, they cannot log in without also controlling the second factor.
MFA is now a baseline requirement for cyber insurance, and it is mandated at maturity level 2 of the ACSC Essential Eight framework. For most Sydney businesses, MFA should be enforced on at minimum: Microsoft 365 (email and all M365 apps), remote access (VPN, RDP, any remote desktop solution), and any cloud system containing sensitive data.
Not all MFA methods are equally strong. SMS-based codes are better than no MFA but can be intercepted through SIM-swapping attacks. Authenticator app-based codes (TOTP) are stronger. Hardware keys (FIDO2/passkeys) are the strongest option and are becoming more common for high-privilege accounts.
Milnsbridge offers Duo MFA enforcement as a separately quoted add-on, covering all managed devices and accounts with enforced MFA policies, real-time access monitoring, and reporting for compliance documentation.
Credential Security as a Layered Strategy
Password hygiene, password management, and MFA are most effective as a combined approach rather than standalone controls. Strong unique passwords (via a password manager) eliminate the credential reuse problem. MFA ensures a stolen password alone is not enough to gain access. Together, they address the majority of credential-based attack paths.
For businesses with higher security requirements — financial services firms, healthcare practices, legal firms handling sensitive data — adding application control (ThreatLocker) prevents malware from harvesting credentials in the first place, and cyber awareness training reduces the phishing exposure that most credential theft starts with.
Milnsbridge holds a 4.9-star Google rating across 99 reviews and has supported Sydney businesses with managed IT and cyber security since 2002. Our managed IT services include credential security controls across all managed plans. To discuss password management and MFA deployment for your business, contact Milnsbridge. You can also review our per-seat pricing and explore our cyber security services in full.
About the Author
Adrian Weir
Adrian Weir is the Managing Director and founder of Milnsbridge Managed IT Services, with over 30 years of global IT experience spanning Telstra, Citibank, Unilever, and hundreds of Sydney SMBs. A Microsoft Partner since 2002, Adrian leads a team of IT specialists delivering responsive, business-focused managed IT support across Greater Sydney.
Meet the Milnsbridge Team →
